- Home
- March 2012
Latest Posts
Quickly Identify an Attack Email Message–Know thy Enemy
Many attacks come from the outside world. Those attacks are directed at your users. There are two ways, and teach these to your workers, to identify almost all of these dangerous email messages before the user clicks on them.
Continue reading Quickly Identify an Attack Email Message–Know thy EnemyLighten Your Load–78 Items your Smartphone replaces
Perhaps you want to lighten your load. Perhaps you want to save money. Perhaps you want to make the most of your investment in your iPhone, iPad, Android, BlackBerry, etc. Brainstorming with CEOs, other senior level executives, and owners resulted in the following list of 78 items your device can replace.
Continue reading Lighten Your Load–78 Items your Smartphone replacesStop Attackers Who Bypass Your Firewall: Firewall or Failwall?
When a user gets one of those phishing emails about, “click here to…” and the user clicks, that communication just went through and your organization’s firewall probably didn’t even realize what was happening. Other than training users, there is a simple way to make up for the weakness of your organization’s firewall.
Continue reading Stop Attackers Who Bypass Your Firewall: Firewall or Failwall?Why Siri is Such a Big Deal–Are You Serious?
New artificial intelligence tools, such as Siri, are a big deal since they “grow better” every second of every day. Since Siri is “hosted in the cloud” that means scientists can monitor and update Siri in real-time.
Continue reading Why Siri is Such a Big Deal–Are You Serious?Cure Your 3 Biggest IT Security Problems–The Deadly Trio
I perform audits around the U.S. and there are three problems that commonly show up at the top of the “danger” list. There is a good chance that your organization has these problems too. Not only are they the three most prevalent dangers, it is self-evident that attackers look for common weak spots. Here are […]
Continue reading Cure Your 3 Biggest IT Security Problems–The Deadly TrioRecent Blog Posts
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
- Three of the Most Useful Links About the SolarWinds Attack:
- The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
- Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
- Your 2021 Budget Should Accurately Differentiate IT Expenses from Cyber Risk Management.
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom